Difference between revisions of "Flipper Zero"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Added use case section)
(Added Use Case categories)
Line 29: Line 29:
As already mentioned there are many different use cases for the Flipper Zero, such as Sub-GHz signal analyzing and cloning, NFC spoofing or controlling of Infrared devices.
As already mentioned there are many different use cases for the Flipper Zero, such as Sub-GHz signal analyzing and cloning, NFC spoofing or controlling of Infrared devices.
In this section some examples for different use cases will be given as well as a basic explanation of how various attacks can be performed.
In this section some examples for different use cases will be given as well as a basic explanation of how various attacks can be performed.
The use cases are divided into the corresponding categories of the Flipper Zero.
=== Sub-GHz ===
=== 125 kHz RFID ===
=== NFC ===
=== Infrared ===
=== GPIO ===
=== iButton ===
=== Bad USB ===
=== U2F ===
=== Applications ===
=== Settings ===

Revision as of 16:02, 20 February 2023

Summary

Flipper Zero Front
Flipper Zero Side

The Flipper Zero is a gadget for penetration testers, system administrators and tech enthusiasts created by Flipper Devices Inc. The device allows capturing and transmitting of various Sub-GHz signals, such as Garage Openers or NFC chips, as-well as Infrared signals. Furthermore the device can be used as a Bad USB Stick and offers iButton capabilities. Thanks to its small form factor it is a perfect device for covert operations.


Description

Setting up the Flipper Zero

  1. Open the box containing the Flipper Zero and boot it by holding down the back button
  2. To use the full potential of the Flipper Zero an Micro SD-Card is needed. Insert it into the right bottom of the flipper with the pins of the SD-Card facing upwards.
  3. After successful installation of the Micro SD-Card, a little SD-Card symbol appears on the top left of the Flipper Zero GUI.
  4. Finally for the best experience the Firmware should be updated, this point is explained in more detail in the section "Firmware Update".

Firmware Update

To update the device either connect the Flipper Zero to a PC via a USB-C cable or connect it to a mobile phone using Bluetooth and use the "Flipper" app. In this guide a PC is used for the firmware update.

  1. First download qFlipper from the official Flipper Zero website https://flipperzero.one/update
  2. After installation start the application and connect the Flipper Zero, it should show the connected device in the GUI.

qFlipper showing pending update

  1. Next click the Update button to initiate the update process, this process can take a few minutes.

qFlipper update progess

  1. After successfully updating the device, the qFlipper software shows the new version number and the Flipper Zero displays "Firmware update success". Now the device is ready to be used again.

Use Cases

As already mentioned there are many different use cases for the Flipper Zero, such as Sub-GHz signal analyzing and cloning, NFC spoofing or controlling of Infrared devices. In this section some examples for different use cases will be given as well as a basic explanation of how various attacks can be performed.

The use cases are divided into the corresponding categories of the Flipper Zero.

Sub-GHz

125 kHz RFID

NFC

Infrared

GPIO

iButton

Bad USB

U2F

Applications

Settings